In recent years, there has been a rise in interest in the study of antibiotic occurrence in the aquatic environment due to the negative consequences of prolonged exposure and the potential for bacterial antibiotic resistance. Most antibiotic residues from treated wastewater end up in the aquatic environment as they are not eliminated in facilities that treat wastewater. Antibiotics must be identified in influent and effluent wastewater using reliable analytical techniques for several reasons. Firstly, monitoring antibiotic presence in aquatic environments. Secondly, assessing environmental risks, computing wastewater treatment plant removal efficiencies, and estimating antibiotic consumption. Therefore, this work aims to provide an overview of existing approaches for determining antibiotics in complicated matrices including wastewater. Because it is currently the most effective and often used analytical method for determining antibiotic residue, liquid chromatography linked to tandem mass spectrometry was chosen.
The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreMost studies indicated that the values of atmospheric variables have changed from their general rates due to pollution or global warming etc. Hence, the research indicates the changes of direct solar radiation values over a whole century i.e. from 1900 to 2000 depending on registered data for four cities, namely (Mosul - Baghdad - Rutba - Basra. Moreover, attemptsto correlate the direct solar radiation with the temperature values have been recorded over that period. The results showed that there is a decreasing pattern of radiation quantities over time throughout the study period, where the value of direct radiation over the city of Baghdad 5550 w/m2 was recorded in the year 1900, but this ratio decreased cle
... Show MoreThe concept of environmental debt, which has several dimensions, emerged in the nineties. One of these dimensions is spatial, referring to the debts that southern countries sustain due to the extraction of natural resources and environmental damage inflicted upon northern countries. Another dimension, the temporal dimension, concerns the environmental debts that current generations owe to their predecessors. That means past generations are culpable for overuse of natural resources and mismanagement. The debt issue is complex, despite many mechanisms to resolve it. Most important are the recently introduced environmental bonds, an important step forward in the field of sustainable financing of environmental debts.
Objective: To identification environmental and psychological violence's components among collegians’ students of different stages, and gender throughout creating specific questionnaire, and estimating regression of environmental domain effect on psychological domain, as well as measuring powerful of the association contingency between violence's domains in admixed form with respondent characteristics, such that (Demographics, Economics, and Behaviors), and extracting model of estimates impact of studied domains in studying risks, and protective factors among collegians’ students in Baghdad city. Methodolog
Wastewater recycling for non-potable uses has gained significant attention to mitigate the high pressure on freshwater resources. This requires using a sustainable technique to treat natural municipal wastewater as an alternative to conventional methods, especially in arid and semi-arid rural areas. One of the promising techniques applied to satisfy the objective of wastewater reuse is the constructed wetlands (CWs) which have been used extensively in most countries worldwide through the last decades. The present study introduces a significant review of the definition, classification, and components of CWs, identifying the mechanisms controlling the removal process within such units. Vertical, horizontal, and hybrid CWs
... Show MoreSelf-repairing technology based on micro-capsules is an efficient solution for repairing cracked cementitious composites. Self-repairing based on microcapsules begins with the occurrence of cracks and develops by releasing self-repairing factors in the cracks located in concrete. Based on previous comprehensive studies, this paper provides an overview of various repairing factors and investigative methodologies. There has recently been a lack of consensus on the most efficient criteria for assessing self-repairing based on microcapsules and the smart solutions for improving capsule survival ratios during mixing. The most commonly utilized self-repairing efficiency assessment indicators are mechanical resistance and durab
... Show MoreIn the present research, a crane frame has been investigated by using finite element method. The damage is simulated by reducing the stiffness of assumed elements with ratios (10% and 20 %) in mid- span of the vertical column in crane frame. The cracked beam with a one-edge and non-propagating crack has been used. Six cases of damage are modeled for crane frame and by introducing cracked elements at different locations with ratio of depth of crack to the height of the beam (a/h) 0.1, 0.20. A FEM program coded in Matlab 6.5 was used to model the numerical simulation of the damage scenarios. The results showed a decreasing in the five natural frequencies from undamaged beam which means
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More